Author of the publication

Hierarchical architecture and protocol for mobile object authentication in the context of IoT smart cities.

, , , and . J. Netw. Comput. Appl., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new hierarchical architecture and protocol for key distribution in the context of IoT-based smart cities., , , and . J. Inf. Secur. Appl., (2022)S-FEAR: Secure-Fuzzy Energy Aware Routing Protocol for Wireless Sensor Networks., and . KSII Trans. Internet Inf. Syst., 12 (4): 1436-1457 (2018)A Comprehensive Survey for IoT Security Datasets Taxonomy, Classification and Machine Learning Mechanisms., , , , and . Comput. Secur., (September 2023)Object Authentication in the Context of the Internet of Things: A Survey., , , and . J. Cyber Secur. Mobil., 9 (3): 385-448 (2020)Geographical Route Selection Based on User Public Transportation and Service Preferences., , , , and . NGMAST, page 144-149. IEEE, (2015)Evaluating the Optimal Number of Clusters to Identify Similar Gene Expression Patterns During Erythropoiesis., , , and . CITS, page 1-5. IEEE, (2022)Hybrid SDN-ICN Architecture Design for the Internet of Things., , , and . SDS, page 96-101. IEEE, (2019)An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning., , , and . Expert Syst. Appl., 213 (Part): 118745 (2023)Artificial Intelligence Platform for Low-Cost Robotics., and . ICSPIS, page 1-4. IEEE, (2020)Hierarchical architecture and protocol for mobile object authentication in the context of IoT smart cities., , , and . J. Netw. Comput. Appl., (2018)